On Fri, 9 Feb 2007, Radomir Zugic wrote:

> Hello List,
> 
> I'm trying to reverse engineer a usb protocol. I'm interested in how
> usb devices work in general. Is the communication always passive or
> can devices actively request data or perform some sort of
> authentification with the driver? I see patterns in the protocol as
> well, is it possible that some devices require a "keep alive" signal?
> I've also tried performing what seem to be requests in the snoopy
> logs, but got inconsistent replies. Is usb communication in general
> request/response or should i consider the device as a finite state
> automaton, where a particular sequence of commands puts the device
> into a certain state (possibly writing desired data to an endpoint)?
> At the moment i have a few hundred pages of logs and before I get lost
> in the details I thought I could ask for some advice. Does anyone have
> any experience in reverse engineering usb protocols and can give me
> some pointers? I could also put the logs online if someone's
> interested in taking a look. The device is a Logitech IO2 digital pen.
> 
> Any help is much appreciated,
> Rade

If you really want to learn about the USB protocols, there's no substitute 
for reading the official specification.  Go to

        http://www.usb.org/developers/docs/

Alan Stern


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier.
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Linux-usb-users@lists.sourceforge.net
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-users

Reply via email to